Features
Waging Trademark War Against 'i-Pirates'
Trademark infringers have preyed on the fertile software marketplaces opened by companies like Apple and Google by offering apps for download under names that are identical or confusingly similar to other well-known brand names. These online trademark bandits are effectively engaging in a form of "i-piracy," whereby they attempt to profit from the goodwill associated with established trademarks by pirating those marks for use in their own knock-off apps.
Features
Trademark Letter Rulings from Customs Service Are Expeditious, But Under-Used Tool
The following article takes a general intellectual-property approach to trademark infringement from the perspectives of both trademark holders and product importers, while providing much useful, technical information for entertainment industry professionals.
Features
Parsing the Copyright Preemption Issue in Claims for Breach of Implied-in-Fact Contracts
The U.S. Court of Appeals for the Ninth Circuit recently reconfirmed the long-established principle that, under California law, an implied-in-fact contract claim over an alleged promise to pay for use of an idea or concept isn't preempted by federal copyright law.
Features
Internet Crime and the Elderly
The same technology that provides the means for customers in various market sectors to truly interact with merchants also allows a similar force multiplication for Internet criminals, including charlatans and other rogues who prey on some of the most vulnerable among us ' the elderly.
Features
Integration In the Cloud
One of the greatest challenges any organization can face is the integration of evolving technology into its culture, practice and processes. At Bradford & Barthel ("B&B"), our main challenges in this regard have focused on the adaptation of Google Apps within our environment and business model.
Features
FCA and ACA Pose Perils for Med-Mal Defendants
Changes to the Patient Protection and Affordable Care Act (ACA) now make it easy for individuals who have gained information during the discovery process in a medical malpractice suit to use that information to bring a <i>qui tam</i> action under the False Claims Act (FCA).
Features
Equipment Lenders Beware
Equipment lenders often consider an out-of-court foreclosure as a fast and efficient way to recover collateral from a defaulting borrower. The Second Circuit Court of Appeals has thrown a monkey wrench into the attractiveness of the foreclosure option, especially for those equipment lenders who foreclose on collateral with the goal of preserving value by operating the business until a strategic buyer can be located.
Features
Professional vs. Ordinary Negligence in the Health Care Setting
The precise line of where ordinary negligence ends and professional negligence begins has remained rather murky. Here's why this makes a difference.
Features
The Role of Informed Consent in Defensive Medicine
Studies that have attempted to quantify the costs of defensive medicine by looking at the impact that tort reform has had on health care savings have obtained inconsistent results.
Features
Judgment Creditors Come One, Come All to NY
Recent case law has made New York an extremely beneficial place for a creditor seeking to enforce a judgment against a debtor's foreign assets.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›